{"id":"https://openalex.org/W4414182279","doi":"https://doi.org/10.3390/sym17091539","title":"Compulsory Black-Box Traceable CP-ABE with Outsourcing of Computation","display_name":"Compulsory Black-Box Traceable CP-ABE with Outsourcing of Computation","publication_year":2025,"publication_date":"2025-09-15","ids":{"openalex":"https://openalex.org/W4414182279","doi":"https://doi.org/10.3390/sym17091539"},"language":"en","primary_location":{"id":"doi:10.3390/sym17091539","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17091539","pdf_url":null,"source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/sym17091539","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011333821","display_name":"Ying Hu","orcid":"https://orcid.org/0000-0002-0969-0381"},"institutions":[{"id":"https://openalex.org/I27688046","display_name":"Hunan Institute of Engineering","ror":"https://ror.org/03zj2rn70","country_code":"CN","type":"education","lineage":["https://openalex.org/I27688046"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Hu","raw_affiliation_strings":["College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China","institution_ids":["https://openalex.org/I27688046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068387851","display_name":"Huidong Qiao","orcid":"https://orcid.org/0000-0003-2950-1039"},"institutions":[{"id":"https://openalex.org/I27688046","display_name":"Hunan Institute of Engineering","ror":"https://ror.org/03zj2rn70","country_code":"CN","type":"education","lineage":["https://openalex.org/I27688046"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huidong Qiao","raw_affiliation_strings":["College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China","institution_ids":["https://openalex.org/I27688046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078360144","display_name":"Jiangchun Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangchun Ren","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047295889","display_name":"Zhiying Wang","orcid":"https://orcid.org/0000-0003-3339-3085"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiying Wang","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100749812","display_name":"Junxian Li","orcid":"https://orcid.org/0000-0001-5686-6397"},"institutions":[{"id":"https://openalex.org/I27688046","display_name":"Hunan Institute of Engineering","ror":"https://ror.org/03zj2rn70","country_code":"CN","type":"education","lineage":["https://openalex.org/I27688046"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxian Li","raw_affiliation_strings":["College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China","institution_ids":["https://openalex.org/I27688046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103247827","display_name":"Han Peng","orcid":"https://orcid.org/0000-0003-4812-964X"},"institutions":[{"id":"https://openalex.org/I27688046","display_name":"Hunan Institute of Engineering","ror":"https://ror.org/03zj2rn70","country_code":"CN","type":"education","lineage":["https://openalex.org/I27688046"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Han","raw_affiliation_strings":["College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China","institution_ids":["https://openalex.org/I27688046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5011333821"],"corresponding_institution_ids":["https://openalex.org/I27688046"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12544715,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"9","first_page":"1539","last_page":"1539"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.699400007724762},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6355999708175659},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.5838000178337097},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5569000244140625},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5490999817848206},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5444999933242798},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5188000202178955},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.49630001187324524},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4726000130176544}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7714999914169312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7166000008583069},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.699400007724762},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6355999708175659},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.5838000178337097},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5569000244140625},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5490999817848206},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5444999933242798},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5188000202178955},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.49630001187324524},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4726000130176544},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.46959999203681946},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4399000108242035},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43810001015663147},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.42239999771118164},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.3824000060558319},{"id":"https://openalex.org/C2781411299","wikidata":"https://www.wikidata.org/wiki/Q7833043","display_name":"Traitor tracing","level":4,"score":0.34060001373291016},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3294999897480011},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3215000033378601},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.2741999924182892},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2718999981880188},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2655999958515167},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3390/sym17091539","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17091539","pdf_url":null,"source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3390/sym17091539","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17091539","pdf_url":null,"source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3307945303","display_name":null,"funder_award_id":"61303191","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4249732352","display_name":null,"funder_award_id":"24A0532","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5468036851","display_name":null,"funder_award_id":"22B0735","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W167928972","https://openalex.org/W1510795740","https://openalex.org/W1511886987","https://openalex.org/W1990413350","https://openalex.org/W2044772384","https://openalex.org/W2080999623","https://openalex.org/W2091291608","https://openalex.org/W2108072891","https://openalex.org/W2139910984","https://openalex.org/W2168571148","https://openalex.org/W2520309000","https://openalex.org/W2756123190","https://openalex.org/W2785432174","https://openalex.org/W2803255421","https://openalex.org/W2896317049","https://openalex.org/W3000106071","https://openalex.org/W3128174515","https://openalex.org/W3183435571","https://openalex.org/W4285301030","https://openalex.org/W4319072405","https://openalex.org/W4323342400","https://openalex.org/W4396758501","https://openalex.org/W4399661803","https://openalex.org/W4407948341"],"related_works":[],"abstract_inverted_index":{"As":[0],"an":[1,19],"asymmetric":[2],"encryption":[3,13],"method":[4],"capable":[5],"of":[6,48,113,166,183],"performing":[7],"one-to-many":[8],"encryption,":[9,184],"the":[10,45,93,109,147,164,170,181],"ciphertext-policy":[11],"attribute-based":[12],"(CP-ABE)":[14],"is":[15,163],"widely":[16],"recognized":[17],"as":[18],"ideal":[20],"cryptographic":[21,50],"tool":[22],"for":[23,41,81,105],"cloud-based":[24],"applications.":[25],"It":[26],"can":[27,145],"empower":[28],"data":[29],"owners":[30],"to":[31,70,77,95,159],"independently":[32],"and":[33,36,139,176,186],"flexibly":[34],"define":[35],"enforce":[37],"access":[38,51],"control":[39,52],"policies":[40],"cloud-stored":[42],"data.":[43],"However,":[44],"practical":[46],"implementation":[47],"CP-ABE-based":[49],"remains":[53],"hindered":[54],"by":[55,66],"critical":[56],"challenges.":[57],"Firstly,":[58],"malicious":[59,98],"users":[60,99],"may":[61],"engage":[62],"in":[63,120,156,180],"key":[64],"abuse":[65],"delegating":[67],"attribute":[68],"keys":[69,76],"unauthorized":[71],"parties":[72],"or":[73,152],"exploiting":[74],"their":[75,102],"construct":[78],"decryption":[79,84],"black-boxes":[80],"providing":[82],"illegal":[83],"services.":[85],"Consequently,":[86],"a":[87,132],"secure":[88],"CP-ABE":[89,114,134],"scheme":[90,135,144,172],"must":[91],"incorporate":[92],"capability":[94],"trace":[96],"such":[97],"who":[100],"misuse":[101],"privileges.":[103],"Secondly,":[104],"resource-constrained":[106],"IoT":[107],"devices,":[108],"substantial":[110],"computational":[111,140],"overhead":[112],"becomes":[115],"prohibitive,":[116],"making":[117],"its":[118],"deployment":[119],"scenarios":[121],"like":[122],"IoT-cloud":[123],"services":[124],"particularly":[125],"challenging.":[126],"In":[127],"this":[128],"paper,":[129],"we":[130],"propose":[131],"new":[133],"with":[136],"black-box":[137],"traceability":[138,175],"outsourcing":[141],"capabilities.":[142],"Our":[143],"improve":[146],"tracing":[148,187],"efficiency":[149],"from":[150],"O(N3)":[151],"O(rlogN)":[153],"(as":[154],"seen":[155],"traditional":[157],"schemes)":[158],"O(1),":[160],"where":[161],"N":[162],"number":[165],"system":[167],"users.":[168],"Furthermore,":[169],"proposed":[171],"features":[173],"compulsory":[174],"maintains":[177],"outstanding":[178],"performance":[179],"aspects":[182],"decryption,":[185],"operations.":[188]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
